SecureView & XenClient XT Security. Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB



Similar documents
Desktop Virtualization. The back-end

SecureView Overview. Click to Edit Master Title Style. Click to Edit Master Subtitle Style. Updated 7 Oct 2013

SecureView: Government/Industry Collaboration Delivers Improved Levels of Security, Performance, and Cost Savings for Mission-Critical Applications

Protect sensitive data on laptops even for disconnected users

Enabling Secure Mobile Operations with Commercial Products

Citrix XenServer 7 Feature Matrix

Virtualization for Cloud Computing

Full and Para Virtualization

9/26/2011. What is Virtualization? What are the different types of virtualization.

Virtualization System Security

Using the TPM to Solve Today s Most Urgent Cybersecurity Problems

RED HAT ENTERPRISE VIRTUALIZATION

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

VMware End User Computing Horizon Suite

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

VMware and CPU Virtualization Technology. Jack Lo Sr. Director, R&D

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

LOCAL VM DESKTOPS Delivering valuable, new usage scenarios to Enterprises

Guardian: Hypervisor as Security Foothold for Personal Computers

Networking for Caribbean Development

Red Hat VDI. David Simmons

Windows Server Virtualization & The Windows Hypervisor

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Cloud Optimize Your IT

IN DETAIL. Smart & Dedicated Servers

Intel Embedded Virtualization Manager

What s New with VMware Virtual Infrastructure

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Servervirualisierung mit Citrix XenServer

Intel Graphics Virtualization Technology Update. Zhi Wang,

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Securing Your Cloud with Xen Project s Advanced Security Features

Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore

Uses for Virtual Machines. Virtual Machines. There are several uses for virtual machines:

Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)

Citrix XenClient 1.0

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

KVM KERNEL BASED VIRTUAL MACHINE

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems

Introduction to Virtual Machines

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Before we can talk about virtualization security, we need to delineate the differences between the

Panoramica su Cloud Computing targata Red Hat AIPSI Meeting 2010

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Software Execution Protection in the Cloud

HRG Assessment: Stratus everrun Enterprise

GE Measurement & Control. Cyber Security for NEI 08-09

2972 Linux Options and Best Practices for Scaleup Virtualization

Attacking Hypervisors via Firmware and Hardware

Next Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com

Frontiers in Cyber Security: Beyond the OS

How to Secure Infrastructure Clouds with Trusted Computing Technologies

Virtual Desktop VMware View Horizon

Bitdefender GravityZone Sales Presentation

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments

Chapter 5 Cloud Resource Virtualization

SCO Virtualization Presentation to Customers

EECatalog SPECIAL FEATURE

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS

Data Centers and Cloud Computing

Regional SEE-GRID-SCI Training for Site Administrators Institute of Physics Belgrade March 5-6, 2009

Virtualization. Types of Interfaces

NetScaler VPX FAQ. Table of Contents

NET ACCESS VOICE PRIVATE CLOUD

Security Overview of the Integrity Virtual Machines Architecture

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

MANAGED DATABASE SOLUTIONS

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Control your corner of the cloud.

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Virtualization. Dr. Yingwu Zhu

HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

Virtual Machine Monitors. Dr. Marc E. Fiuczynski Research Scholar Princeton University

Knut Omang Ifi/Oracle 19 Oct, 2015

Hardware-Assisted Workspace Virtualization RingCube vdesk on Intel Core vpro Processors

The Virtualization Practice

PARALLELS SERVER BARE METAL 5.0 README

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V

Xen Cloud Platform Update

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Virtual Machine Security

Masters Project Proposal

How To Build A Software Defined Data Center

How Network Virtualization can improve your Data Center Security

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved

Remote PC Guide Series - Volume 1

Understanding Full Virtualization, Paravirtualization, and Hardware Assist. Introduction...1 Overview of x86 Virtualization...2 CPU Virtualization...

Virtualised MikroTik

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

Secure Cloud-Ready Data Centers Juniper Networks

DOBUS And SBL Cloud Services Brochure

Virtualization Support - Real Backups of Virtual Environments

Transcription:

SecureView & XenClient XT Security Dr. Ryan Durante Chief, Cross Domains Solutions & innovation AFRL/RIEB AFMC PA Case Number: AFMC-2011-0166 The material was assigned a clearance of CLEARED on 01 Sep 2011

Overview The Problem Background Solution Xen Background Programmatics SecureView 2.0 Xen Client XT Deep Dive Summary POCs 2 2

The Problem The Problem Uncertainty using untrusted software and hardware components in commercial and military computer systems for networked forces to maintain mission operations in high threat contested cyber environments Current State: DoD/IC missions & systems reliant on COTS IT management assumes inherent trust of networked systems Most components are developed in foreign countries Mistaken faith that compromised devices would be identified by Intrusion Detection Systems or AV The Solution Must Balance security, performance, and affordability Be flexible to include multi-platform and multi-mission support Be simple Increase the trust in computing on untrusted systems Maintain operations in a contested cyber environment 3 3

Requirements Require highest levels of Security, Isolation, Auditability Need access to multiple partner computing environments Each environment needs a segregated network Heavy duty workloads 4 4

SecureView Background AFRL requested to develop a secure MLS workstation by the DoD/IC. Zero tolerance for data exfiltration No split tunneling No print screen Malware resilient No third party screen scraping/key logging Minimal impact to host agency Rapid provisioning (4 hours) 5 5

The Solution Over a dozen different solutions were analysed over a six month period. A Type 1 client hypervisor architecture was selected. Based on Citrix s Xen Client Plus some GOTS enhancements SecureView is the name of the government program that utilizes XenClient XT as the basis for a multi level workstation. 6 6

SecureView (Login Screen) 7 7

The Partnership AFRL, Intel and Citrix kicked off a partnership in early 2010. Citrix & Intel have provided the government an unprecedented level of cooperation. Change requests are often turned around in a matter of days and weeks, not months and years. NSA CSS has provided steering, guidance, reference implementations NSA I773 provided testing resources. 8 8

What is XenClient? Local VM Desktop Local VM Desktop Citrix XenClient X86 Hardware Type 1 hypervisor: High performance because it runs on bare metal Built on 64-bit open source Xen technology Runs multiple virtual desktops simultaneously Hardware independent VMs Service VM Architecture for extensibility 9 9

Why the Xen Hypervisor? Enterprise and Cloud proven Mature market proven Xen virtualization engine Battle tested in large clouds and datacenters The Xen.org Open Source Development Community: Hundreds of developers, Companies, Universities and other orgs More than 25,000 code submissions in Xen 4.0 Reliability, security, performance, with full enterprise feature-set >85% of the Public Infrastructure Cloud runs on Xen Thin, Open Source, Inspected Thin hypervisor minimizes trusted codebase Thriving security community Open to inspection 10 10

Client Hypervisor Benefits Security, Manageability, Attestability and Supportability Runs multiple independent VMs with policy controlled information flow Enables Multiple Independent Levels of Security systems Enables out-of-band management & policy enforcement Control removable media access, image update, backup, attestation Thick or Thin mode of operation 11 11

SecureView Government Industry Collaboration 12 12

Modifications from XC to XCXT DRTM of hypervisor and dom0 (measured launch) Platform hardening Disaggregate and de-privilege functionality into dedicated service VMs Moved network stack to a separate service VM Implemented SELinux in dom0 and the NDVM with a custom set of SELinux policies Narrow interfaces between components Cross VM mouse control 13 13

Cost XenClient XT MSRP QTY 1 = $499/license Typical Citrix Federal/DoD volume discount = 51-52% Actual cost around $250/license Maintenance = 20% or $50/year 14 14

Supported Platforms As of Jun 2011, the following desktop platforms are supported: Dell Optiplex 980 HP 8100 (Numerous laptops) HCL will be expanded with v2.0 In testing: Dell Optiplex 990 HP 8200 15 15

Program Documentation System Security Plan (SSP) Security Test Plan & Procedures (STP) Master Security Requirements Matrix (MSRTM) Installation & Configuration Guide (ICG) Administrator Guide (AG) User s Guide (UG) Integrated Support Plan (ISP) 16 16

Certification Xen Client XT was favorably evaluated against the new NIST 800-53 Security Controls Catalog for Confidentiality: HIGH Integrity: HIGH Availability: MEDIUM ATO: 25 Aug 2011 17 17

Comparison to other MLS Clients Unprecedented Security via hardware based security features: VT-d, VT-x, EPT, TPM, TXT Can be run on either thick or thin mode Supports robust 3D graphics Relatively Simple architecture Extensive desktop server backend not required but can be leveraged if desired Uses low cost commodity desktop hardware (or laptops) Cost ($250/client) is significantly cheaper than other MLS access solutions Industry Support 18 18

XenClient XT Architecture Deep Dive 19 19

Secure Isolation Maintaining isolation between VMs is priority #1 Essential for Cloud, and for Client Spatial and Temporal isolation Use good software engineering practice Thin hypervisor: minimize code running with privilege (60K- 70K SLOC) Disaggregate and de-privilege functionality into dedicated Service VMs Narrow interfaces between components Hypervisors are simpler than OS s, simpler than OS kernels Use modern high-level languages where possible New hardware technologies help VT-x, VT-d, EPT: reduce software complexity, enhanced protection TPM/TXT: Enable Dynamic Root of Trust 20 20

XenClient Architecture Service VM Control Domain Receiver for XC User VM User VM Xen Client Intel Hardware VT-d VT-x AES-NI 21 21

XenClient XT (SecureView) Architecture XenClient XenClient XT Unique Service VMs Control Domain Receive r for XC Network Isolation VPN Isolation User VM User VM SELinux Policy Granularity Policy Granularity Xen Client XT Xen Security Modules Intel vpro Hardware VT-d VT-x TXT AES-NI 22 22

Platform Hardening NSA s Xen Security Modules XSM-FLASK for Mandatory Access Control Low-level isolation enforcement, fine-grained privilege for Service VMs OpenEmbedded Linux used for platform Service VMs SELinux provides MAC Platform Service VMs: disaggregate and deprivilege Network Driver VMs, User Interface VM Per-VM Device Emulation VMs Compartmentalize complex guest-facing function, reduce to narrow interface Future: Virtual TPM VMs 23 23

Hardware Assisted Security Security rooted in the HW with Intel vpro Trusted boot with Intel Trusted Execution Technology Secure device access with Intel directed I/O virtualization technology Hardware accelerated disk encryption with Intel AES- NI 24

Measured Launch Verify Xen Client installation integrity, prevent offline tampering of installation or configuration state Measured Launch Intel TXT used to establish DRTM, measure Xen Client primary components on every boot Extend measurements to include secondary components Trusted Platform Module PCRs reflect the state and configuration of system All XenClient device configuration state is encrypted Encryption key is sealed by the TPM, only released if PCR values match those expected 25 25

XenClient XT: Trusted Execution Technology Hardening the foundation Power on HW System FW verified by TXT prior to boot Measure Firmware/BIOS TXT HW Hypervisor measured by TXT Measure Hypervisor Hypervisor HW Consult Trusted Platform Module to unseal device encryption key if measurements match Hypervisor HW Launch VMs, OS, etc App App App OS Hypervisor HW App App App OS Verify XenClient integrity, prevent offline tampering of installation or configuration state All XenClient configuration state is encrypted Encryption key is sealed by the TPM, only released if measurements match expected Unable to recover encryption key so boot cannot proceed System lockout. Recovery key required Hypervisor HW 26 26

Enhanced Policy Granularity Wipe on reboot Guest VMs Purge user changes, boot to a known clean VM Persist admin defined settings Local controls without Synchronizer Local disk encryption VM configurations lockdown Enhanced isolation policies Audio, Graphics, USB, Optical Drives Inter VM communication 27 27

Network Architecture Network Driver VM (NDVM) controls physical network devices Wired and Wireless (optional) VT-d IOMMU used to restrict device DMA Provides protection against buggy/malicious drivers or firmware NDVM can be security non-critical: reduces compromise to denial of service Network traffic passing through NDVM already encrypted In-VM VPN (using USB token), or per-vm Service VM implementing VPN NDVM can implement per-vm network restrictions E.g. require all VM traffic to go to a particular VPN endpoint IP to inhibit split tunnelling Bridged or DNAT, VLAN 28 28

XenClient XT: Network Isolation Service VMs Service VMs Require additional system resources Deliver highest levels of isolation Isolated Networking Service VM Device drivers, physical NIC access, and routing Network based attacks don t compromise the control domain VPN Service VMs VPN runs outside user VMs for increased isolation Allows split tunneling to be eliminated Advanced networking policy Access allowed to only approved infrastructure Per VM firewalling and QOS 29 29

IO Device Pass-through vs. Virtualization Pass-through dedicates a device to a particular VM Protection provided by VT-d IOMMU for PCIe devices Requires guest driver for particular device Device virtualization enables devices to be shared between VMs Higher-level model allows device to be multiplexed, hardware abstracted Presented to VMs using device emulation, or para-virtualization for improved performance and code simplicity Different levels possible: controller vs. end device E.g. Virtualize USB host controller, pass-through individual devices 30 30

Hardware Virtualization User VM User VM Control Domain Service VM Xen Hypervisor Audi Audio o Disk AMT NIC GPU USB x86 Hardware TXT TPM 31 31

Hardware Pass-Through Operation User VM User VM Control Domain Service VM Xen Hypervisor Audio Disk AMT NIC GPU USB x86 Hardware TXT TPM 32 32

Input Path Goals Prevent one VM from logging input intended for another VM Prevent injection of key events Full-screen and seamless desktop integration modes Keyboard and Pointer devices always controlled by platform Platform knows which VM is on screen, routes keyboard and mouse events exclusively to that VM Key sequences processed by platform for secure attention, VM switching Support for secure keyboard path even in seamless desktop mode When application window gets focus, keyboard is routed to the respective VM Allows mouse switching to move focus between different display heads 33 33

USB Device Virtualization Goals Provide broad USB device compatibility; good performance Control routing of devices to VMs through policy enforcement Implementation Platform owns USB host controller devices VMs have Xen para-virtual USB host controller When device plugged in, identify it, apply policy, make visible on guest host controller Forward USB messages between real and virtual host controllers Similar approach for SATA optical drives Enables Blu-ray playback, DVD writing, etc. 34 34

GPU Virtualization Ultimate goals of GPU virtualization Support full-performance rendering from multiple VMs Full application compatibility Must retain isolation prevent screen scraping, pixel injection XenClient supports several different graphics architectures Implemented Hybrid virtualized/pass-through GPU Display-side of GPU is virtualized, rendering-side passedthrough to single VM One VM gets 3D performance, others get reduced capability via PV GPU Platform retains control of the GPU s display/output functions We always control which VM is on screen, don t rely on GPUowning VM to be running 35 35

SecureView 2.0 36 36

What s New in 2.0? Major themes: STM Integration Expanded hardware compatibility NSA HAP R2 Compliance Better enterprise management Production scale synchronizer Simplified user experience 37 37

Integration of SMM Transfer Monitor It has been proven that Intel TXT can be subverted via certain specialized attacks against SMM mode. SecureView 2.0 will include a System Management Mode (SMM) Transfer Monitor (STM) A correct STM implementation can mitigate SMM attacks. Developed by Dell in collaboration with the NSA Available on select Dell system 1QCY12 38

Additional Vendor Support XenClient 1.x XenClient 2.0 39 39

Production Ready Synchronizer Enhanced scalability Enhanced single server scalability Automatic throttling of connections under heavy load Support for large complex AD environments with AD trust Accelerated and optimized image transfers and installs DVD/USB pre-caching Backup optimizations User profile virtualization and focused backup for static image mode Restore user profile with newer OS/Apps image Faster backups with less CPU overhead Smart filtering of page file, hibernate file, and unused data blocks 40 40

Production Ready Synchronizer Operational enhancements Enhanced XenClient device details, reporting, and filtering Revamped installation system Appliance operations console At a glance system configuration Simple configuration management Internet facing Synchronizer enhancements Separated Admin UI and Client Access Device, User, and Group removal 41 41

Simplified User Interfaces XenClient Receiver Revamped to be simpler and more responsive New per VM details view replaces advanced view VM hotkey switching OEM branding support Synchronizer Revamped assignment and policy wizard Simplified Operations console New device details view 42 42

Additional Enhancements Up to 8GB of memory per VM Support for Windows 7 SP1 32/64 Experimental support for Ubuntu 11.04 Improved integrated Windows 7 audio support 43 43

Secure Window Compositing NEAR TERM Combining application windows from multiple VMs into the same desktop display, adding colored borders Enabling seamless launch of applications running in different VMs Continue to prevent key logging FAR TERM: Use video overlays and secure compositing to prevent screen scraping/pixel injection while maintaining 3D performance (integrate NSA R23 SVP work) 44 44

Summary SecureView breaks new ground in client virtualization True type 1 hypervisor for robust isolation and performance Enhanced Isolation Pack meets government security criteria Open Source based More affordable More capable SecureView is available now NIST 800-53 Certified (ATO 25 Aug 2011) 45 45

Points of Contact Program Manager Dr. Ryan Durante, AFRL/RIEB 315.330.4004 ryan.durante@rl.af.mil Lead Engineer Steve Scheiderich, MicroQuest 315-330-4635 stephen.scheiderich.ctr@rl.af.mil Deputy Program Manager John Woodruff, AFRL/RIEB 315.330.7657 john.woodruff@rl.af.mil Xen Technical Lead Kevin Pearson, AFRL/RIEB 315-330-3202 Kevin.pearson@rl.af.mil NGMS Program Manager Steve Ochsner, NGMS 402.293.3988 steve.ochsner@ngc.com LPS Lead TJ Vestal, AFRL/RIG 315-330-7014 thomas.vestal@rl.af.mil 46 46

Q&A 47 47